Medium 9781601323699

Security and Management: The 2016 International Conference Proceedings

Views: 35
Ratings: (0)

WorldComp is an international conference that serves researchers, scholars, professionals, students, and academicians who are looking to both foster working relationships and gain access to the latest research results. It is being held jointly (same location and dates) with a number of other research conferences; namely, The 2016 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP'16). The Congress is among the top five largest annual gathering of researchers in computer science, computer engineering and applied computing. We anticipate to have attendees from about 85 countries/territories.

List price: $49.95

Your Price: $39.96

You Save: 20%

Remix
Remove
 

13 Slices

Format Buy Remix

SESSION Network Security I

PDF

Int'l Conf. Security and Management | SAM'16 |

1

SESSION

NETWORK SECURITY I

Chair(s)

Prof. Kathy Liszka

ISBN: 1-60132-445-6, CSREA Press ©

2

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

3

A Secure Routing Scheme for Networks with

Unknown or Dynamic Topology using A-star

Algorithm

Joseph Flinn

Hen Su Choi Ortiz

Shengli Yuan

Whitworth Univeristy

300 W. Hawthorne Rd.

Spokane, Washington 99251–2515 jflinn18@my.whitworth.edu

University of California San Diego

9500 Gilman Dr.

La Jolla, California 92093–0009 hechoi@ucsd.edu

University of Houston-Downtown

One Main St.

Houston, TX 77002 yuans@uhd.edu

Abstract—In recent years, networks with unknown or dynamic topology are becoming more common. In such networks, each node only knows the network topology that it is connected to. Some examples of networks with these characteristics are

 

SESSION Cryptographic Technologies I

PDF

Int'l Conf. Security and Management | SAM'16 |

45

SESSION

CRYPTOGRAPHIC TECHNOLOGIES I

Chair(s)

Prof. Levent Ertaul

ISBN: 1-60132-445-6, CSREA Press ©

46

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

47

Secure Computing through Homomorphic

Encryption on a Peer-Servicing Public Cloud

Computing Platform

Sheng-Tzong Cheng and Yin-Jun Chen

Dept. of Computer Science and Information Engineering, National Cheng Kung University, Taiwan

Abstract—Cloud

computing is able to redistribute the computing resources, and then reduces the maintenance cost, thereby increases profits. Ensuring data security and maintaining confidentiality of personal information are important issues of cloud computing security. In order to avoid malicious attacks and data theft in the applications of cloud computing, homomorphic encryption provides a novel technique for computing with zero-knowledge privacy. Fully homomorphic encryption, proposed by Gentry in 2009, allowed the execution of all kinds of secured computation without the secret key. Data privacy in the public cloud could be achieved in this way.

 

SESSION Security Applications

PDF

Int'l Conf. Security and Management | SAM'16 |

75

SESSION

SECURITY APPLICATIONS

Chair(s)

Dr. Greg Vert

ISBN: 1-60132-445-6, CSREA Press ©

 

SESSION Security Applications

PDF

Int'l Conf. Security and Management | SAM'16 |

75

SESSION

SECURITY APPLICATIONS

Chair(s)

Dr. Greg Vert

ISBN: 1-60132-445-6, CSREA Press ©

76

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

77

Strategic Risk Management in Counter-Terrorism for the Railbound Public Transport

Merging Qualitative and Quantitative Operations Research Techniques

Martin Zsifkovits*, Stefan Pickl

Universität der Bundeswehr München

Institute for Informatics, Mathematics, and Operations Research

Neubiberg, Germany

*martin.zsifkovits@unibw.de, stefan.pickl@unibw.de

*Corresponding author

Abstract—Every modern state is strongly dependent on a functioning infrastructure. This makes it even more vulnerable and furthermore attractive for terroristic attacks. The situation gets even more severe when people are directly involved, such as in public transport, as they are – at least for some groups of terrorists – the main aim of attacks. In the paper at hand we propose the standardized ISO31000 risk management framework coupled with various qualitative and quantitative Operations

 

SESSION Network Security II

PDF

Int'l Conf. Security and Management | SAM'16 |

101

SESSION

NETWORK SECURITY II

Chair(s)

Prof. Guillermo Francia

ISBN: 1-60132-445-6, CSREA Press ©

 

SESSION Network Security II

PDF

Int'l Conf. Security and Management | SAM'16 |

101

SESSION

NETWORK SECURITY II

Chair(s)

Prof. Guillermo Francia

ISBN: 1-60132-445-6, CSREA Press ©

102

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

103

A Routing Algorithm with Path Randomization for Enhanced Security and

Balanced Energy Consumption

David C. Yuan

Lei Chen

Texas Academy of Math and Science

University of Northern Texas

Denton, Texas 76203 davidyuan@my.unt.edu

Abstract: Routers are located at the core of communication networks such as the Internet and sensor networks. The routing algorithms deployed in routers have a profound impact on network security. The traditional shortest-path algorithm used in OSPF and other routing protocols has inherent vulnerability to certain types of attacks. These routing algorithms also influence the life span of the switches and routers with high sensitivity to energy consumption. In this paper, we address these challenges by developing a novel routing algorithm with a randomization process so that packets are sent through optimal yet less predictable paths. It is expected that this process will help increase the network defense against eavesdropping and jamming attacks. It is also expected to improve the energy consumption in sensor networks and similar ad hoc networks.

 

SESSION Special Track: End-To-End Security and Cybersecurity; From the Hardware to the Application

PDF

Int'l Conf. Security and Management | SAM'16 |

129

SESSION

SPECIAL TRACK: END-TO-END SECURITY AND

CYBERSECURITY; FROM THE HARDWARE TO

APPLICATION

Chair(s)

Prof. Tiziana Margaria

ISBN: 1-60132-445-6, CSREA Press ©

130

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

131

SEcube™: an Open Security Platform General Approach and Strategies

Antonio VARRIALE1, Giorgio DI NATALE2, Paolo PRINETTO3, Bernhard STEFFEN4, Tiziana MARGARIA5

1

Blu5 Labs Ltd, Blu5 Group, Ta Xbiex, Malta – av@blu5labs.eu

LIRMM, CNRS, Montpellier, France – giorgio.dinatale@lirmm.fr

3

CINI Cyber Security National Lab & Politecnico di Torino, Torino, Italy – paolo.prinetto@polito.it

4

Chair of Programming Systems, TU Dortmund, Dortmund, Germany – bernhard.steffen@tu-do.de

5

University of Limerick and Lero, The Irish Software Research Centre, Limerick, Ireland – tiziana.margaria@lero.ie

 

SESSION Security Education + Information Assurance + Hardware Security

PDF

Int'l Conf. Security and Management | SAM'16 |

175

SESSION

SECURITY EDUCATION + INFORMATION

ASSURANCE + HARDWARE SECURITY

Chair(s)

Prof. Ken Ferens

ISBN: 1-60132-445-6, CSREA Press ©

176

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

177

Towards a Mathematical Model for Autonomously Organizing Security Metric Ontologies

Gregory Vert

Bryce Barrette

College of Security and Intelligence

Global Security and Intelligence Studies

Embry Riddle Aeronautical University

Embry Riddle Aeronautical University

Barretb4@erau.edu vertg@erau.edu

Bilal Gonen

Assistant Professor of Computer Science

University of West Florida bilalgonen@gmail.com

Abstract:

Security metrics can be contextually related to the operation of the system and provide a static measure of system security. Some are better at determining the system security. However, their values can change dynamically to threat. Thus they can be grouped into ontologies measuring system health and security under threat conditions. The problem with current approaches is that they are static and that it does not consider the fact that metrics can also occur in multiple ontological classes.

 

SESSION Biometrics and Forensics

PDF

Int'l Conf. Security and Management | SAM'16 |

221

SESSION

BIOMETRICS AND FORENSICS

Chair(s)

Dr. Haydar Teymourlouei

Dr. Khaled Ali Shehata

ISBN: 1-60132-445-6, CSREA Press ©

222

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

223

Subject Movement at Different Force Levels in a Fingerprint Recognition System

Kevin Chan, Jeffrey Chudik, Katrina Molina, Alex Hirsch, Brennon Morning, Evan Pulliam, Drew

Radcliff, Stephen Elliott, Ph.D.

Department of Technology Leadership and Innovation

Purdue University

West Lafayette, Indiana, USA

Abstract—There has been an increase in biometric application and advancement, and researchers continuously move to improve the technology. Fingerprint recognition is one of the biometric modalities that has experienced this growth, with its increasing presence in Homeland Security and law enforcement. This study investigated the subject performance movement within a fingerprint recognition system. The performance of a biometric system can be tied to the population using it. Analysis of the population brings context and granularity to performance results.

 

SESSION Computer Sercurity + Security Applications

PDF

Int'l Conf. Security and Management | SAM'16 |

265

SESSION

COMPUTER SECURITY + SECURITY

APPLICATIONS

Chair(s)

Dr. Martin Zsifkovits

Dr. Devesh Jinwala

ISBN: 1-60132-445-6, CSREA Press ©

266

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

267

Cloud Application Model

Personal Healthcare Record Implementation

Ashraf Gaffar

Arizona State University

Meza AZ USA ashraf.gaffar@asu.edu

Amer Jneid (Author)

Arizona State University

Tempe AZ USA ajneid@asu.edu

Abstract— Privacy and confidentiality concerns over Personal

Health Records (PHR) are on the rise, largely driven by how the Internet is being used as vehicle to transfer such records

PHR are generated to the benefit of the user; these records are exchanged through emails, or 3rd party Clouds with little means to protect the privacy of the user or confidentiality of the records.

 

SESSION Crytographic Technologies II

PDF

Int'l Conf. Security and Management | SAM'16 |

311

SESSION

CRYPTOGRAPHIC TECHNOLOGIES II

Chair(s)

Dr. Kazi Zunnurhain

Dr. Jue-Sam Chou

ISBN: 1-60132-445-6, CSREA Press ©

312

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

313

A New Group-based Secret Function Sharing with

Variate Threshold

Anneke Soraya Hidayat† , Dae-Soo Kim† , Eun-Jun Yoon‡ and Kee-Young Yoo†∗

School of Computer Science and Engineering

Kyungpook National University

Daegu, South Korea

Department of Cyber Security

Kyungil University

Gyenggsan-Si, Gyeongbuk, South Korea

Email: annekesoraya@gmail.com, stairways@infosec.knu.ac,kr, ejyoon@kiu.kr, yook@knu.ac.kr∗

Corresponding Author

Abstract—Secret sharing is a cryptographic scheme that divides a secret key s to n participants with threshold t. Thus, assuring that no less than t shares can reconstruct the secret. The application of secret sharing also widens not only one group but several hierarchical structure. However, the group-based secret sharing proposed by Liu et al. in 2014 has some drawbacks, which are having an equal threshold for each group and also reconstruct only partial secret when the present groups are less.

 

SESSION Poster Papers

PDF

Int'l Conf. Security and Management | SAM'16 |

343

SESSION

POSTER PAPERS

Chair(s)

TBA

ISBN: 1-60132-445-6, CSREA Press ©

344

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

345

��s-Tor-y� on� User� Acceptance� of� PETs.

Marta Piekarska1 , Miguel Rios Quintero2

1 Security in Telecommunications, Technische Universität Berlin, Berlin, Germany

2 IP-Based Assesment, Technische Universität Berlin, Berlin, Germany

Abstract— Today every user has a plethora of devices to choose from, depending on the task they want to perform.

However every move they make leaves a trace on the internet. Global surveillance is so common we learned to accept it and not even try to fight against it. There are existing solutions that help protect users, however little research has been done on the usability and transparency of these tools.

 

Untitled

PDF

Author Index

Abdelazim, Mohamed - 244

Abdelbaki, Nashwa - 237

Abdulhadi, Mohammed M. - 367

AbManan, Jamalul-lail - 108

Airofarulla, Giuseppe - 159

Al-Bahadili, Hussein - 338

Al-Saidi, Nadia M. G. - 367

Alharthi, Raed - 274 , 280

Alshahrani , Manal - 115

Alshahrani, Hani - 274 , 280

Alshehri, Ali - 274 , 280

Alwishah, Yakeen - 54

Alzahrani, Abdulrahman - 280

Amsaad, Fathi - 206

Baldoni, Roberto - 168

Barrere, Francois - 89

Barrette, Bryce - 177

Bassous, Richard - 54

Benzekri, Abdelmalek - 89

Beyerer, Jurgen - 185

Bier, Christoph - 185

Binner, Jane - 192

Birnstill, Pascal - 185

BoBelmann, Steve - 145

Carelli, Alberto - 138 , 152

Chan, Chien-Chung - 286

Chan, Kevin - 223

Chen, Lei - 103

Chen, Yalin - 61

Chen, Yin-Jun - 47

Cheng, Sheng-Tzong - 47

Choi Ortiz, Hen Su - 3

Chou, Jue-Sam - 61

Chowdhury, Md Nasimuzzaman - 30

 

Details

Print Book
E-Books
Slices

Format name
PDF
Encrypted
No
Sku
BPP0000226312
Isbn
9781601323699
File size
14.8 MB
Printing
Allowed
Copying
Allowed
Read aloud
Allowed
Format name
PDF
Encrypted
No
Printing
Allowed
Copying
Allowed
Read aloud
Allowed
Sku
In metadata
Isbn
In metadata
File size
In metadata